-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Register now!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Filter by type
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Vulnerability Scanning [x]
- Cybersecurity (28)
- Network Security and Applications (28)
- Security Management (23)
- Network Vulnerability Assessment (13)
- Intrusion Detection and Prevention (7)
- Security Risk Assessment and Analysis (6)
- Security Awareness (5)
- Data Security (3)
- Firewalls (3)
- Incident Handling and Response (3)
- Security Planning (3)
- Authentication (2)
- Identity and Access Management (2)
- Information Systems and Services (2)
- Information Technology Management and Leadership (2)
- Open Source (2)
- Policy and Law (2)
- Security Architecture (2)
- Planning (1)
EDUCAUSE Library Items for Vulnerability Scanning
-
Perfigo, Inc./Cisco Systems, Inc., An EDUCAUSE Platinum Partner - Cleaning Dirty Machines and Other Tales at the Network Edge
-
January 13, 2005
|
A session at the EDUCAUSE Mid-Atlantic Regional Conference 2005
Last year worms wreaked paths of destruction across universities and colleges. Determined to avert a similar scenario this fall, several universities installed CleanMachines, a system that scans in…
-
Network Security and Personally Managed Computers
-
January 1, 2004
Computers connected to the campus network that are not managed by the institution pose unique security risks. Automated approaches are necessary to secure privately controlled devices and manage pe…
-
The Vulnerability Scanning Cluster
-
January 1, 2004
The Department of IT Security and Privacy at Purdue University, with collaboration from CERIAS, has developed a Web-based front end to Nessus, the popular open source vulnerability scanner, to cent…
-
Protecting University Networks Using Automated Scanning
-
January 1, 2004
This presentation will describe how to extend an existing open source system to preemptively scan untrusted hosts to determine patch level before granting general network access, with a specific fo…
-
Vulnerability Database Opens
-
January 1, 2004
The Open Source Vulnerability Database (OSVDB), the work of a group of security industry volunteers, is an independent database aimed at logging all security vulnerabilities on the Internet. It has…
-
Empowering Users with a Proactive Security Strategy
-
January 1, 2004
Rutgers University Computing Services provides users a four-tiered defense in-depth strategy: planning, prevention, detection, and reaction and recovery. The merging of vulnerability scanning data …
-
Planning for Improved Security
-
January 1, 2003
© 2003 Mark Bruhn and Rodney Petersen EDUCAUSE Review, vol. 38, no. 6 (November/December 2003): 98–99. Planning for Improved Security Mark Bruhn and Rodney Petersen C…
-
Best Practices for Securing Your IT Resources
-
January 1, 2003
Indiana University's Best Practices for IT security. Includes information on doing computer scans to encrypting sensitive data. Indiana Universit…
- « first
- ‹ previous
- 1
- 2
- 3
















